Cybersecurity and the MBA

a dissertation

Business & Finance, Business Reference, Education, Nonfiction, Computers, Internet, Security, Advanced Computing, Information Technology
Cover of the book Cybersecurity and the MBA by Reynolds H John, Wicklit Publishing House, LLC
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Reynolds H John ISBN: 9780996224949
Publisher: Wicklit Publishing House, LLC Publication: July 24, 2018
Imprint: Wicklit Publishing House, LLC Language: English
Author: Reynolds H John
ISBN: 9780996224949
Publisher: Wicklit Publishing House, LLC
Publication: July 24, 2018
Imprint: Wicklit Publishing House, LLC
Language: English

Given the pervasiveness of and our reliance upon digital infrastructure, highly organized sophisticated cyber-threat actors have brought serious cyber-risk peril to everyone. Organizational leaders are not aware of the impacts of cybersecurity risk to business assets. Academic institutions are failing to incorporate cybersecurity risk management into business programs leading to inadequately prepared leaders. This explanatory sequential mixed methods study explored 50 U.S. leading business schools’ MBA curricula; identified gaps in cybersecurity risk management course content; and then investigated the quantitative results with a subset of twelve business schools’ MBA program leadership and faculty to advise curricula reform.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Given the pervasiveness of and our reliance upon digital infrastructure, highly organized sophisticated cyber-threat actors have brought serious cyber-risk peril to everyone. Organizational leaders are not aware of the impacts of cybersecurity risk to business assets. Academic institutions are failing to incorporate cybersecurity risk management into business programs leading to inadequately prepared leaders. This explanatory sequential mixed methods study explored 50 U.S. leading business schools’ MBA curricula; identified gaps in cybersecurity risk management course content; and then investigated the quantitative results with a subset of twelve business schools’ MBA program leadership and faculty to advise curricula reform.

More books from Information Technology

Cover of the book A Normative Theory of the Information Society by Reynolds H John
Cover of the book Ethical and Social Issues in the Information Age by Reynolds H John
Cover of the book Understanding and Using Rough Set Based Feature Selection: Concepts, Techniques and Applications by Reynolds H John
Cover of the book Google It by Reynolds H John
Cover of the book Reasoning and Unification over Conceptual Graphs by Reynolds H John
Cover of the book Lectures on Quantum Mechanics by Reynolds H John
Cover of the book FusionCharts Beginner's Guide by Reynolds H John
Cover of the book Kompendium semantische Netze by Reynolds H John
Cover of the book Business Software Development by Reynolds H John
Cover of the book Practical Site Reliability Engineering by Reynolds H John
Cover of the book Multi-dimensional Optical Storage by Reynolds H John
Cover of the book Building Telephony Systems with OpenSER by Reynolds H John
Cover of the book La trilogie OS X Lion by Reynolds H John
Cover of the book Wireless Internet by Reynolds H John
Cover of the book CakePHP 2 Application Cookbook by Reynolds H John
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy